Manage filesystems using the CLI
This page describes how to view and manage filesystems using the CLI.
Last updated
This page describes how to view and manage filesystems using the CLI.
Last updated
Using the CLI, you can perform the following actions:
Command: weka fs
Use this command to view information on the filesystems in the WEKA system.
Command: weka fs create
Use the following command line to create a filesystem:
weka fs create <name> <group-name> <total-capacity> [--obs-name <obs-name>] [--ssd-capacity <ssd-capacity>] [--thin-provision-min-ssd <thin-provision-min-ssd>] [--thin-provision-max-ssd <thin-provision-max-ssd>] [--kms-key-identifier kms-key-identifier] [--kms-namespace kms-namespace] [--kms-role-id kms-role-id] [--kms-secret-id kms-secret-id] [--auth-required auth-required] [--encrypted] [--data-reduction]
Parameters
name
*
A descriptive label for the filesystem, limited to 32 characters and excluding slash (/
) or backslash (\
).
group-name
*
Name of the filesystem group to which the new filesystem is to be connected.
total-capacity
*
Total capacity of the new filesystem. Minimum value: 1GiB.
obs-name
Object store name for tiering. Mandatory for tiered filesystems.
ssd-capacity
For tiered filesystems, this is the SSD capacity. If not specified, the filesystem is pinned to SSD.
To set a thin provisioned filesystem, the thin-provision-min-ssd
attribute must be used instead.
SSD capacity is set to total capacity
thin-provision-min-ssd
thin-provision-max-ssd
kms-key-identifier
Customize KMS key identifier for this filesystem (only for HashiCorp Vault).
kms-namespace
Customize KMS namespace for this filesystem (only for HashiCorp Vault).
kms-role-id
Customize KMS role-id for this filesystem (only for HashiCorp Vault).
kms-secret-id
Customize KMS secret-id for this filesystem (only for HashiCorp Vault).
auth-required
No
encrypted
Encryption of filesystem.
No
data-reduction
Enable data reduction. The filesystem must be non-tired and thin-provisioned. A license with data reduction is required.
No
To create a new filesystem, the SSD space for the filesystem must be free and unprovisioned. When using thin-provisioned filesystems, that might not be the case. SSD space can be occupied for the thin-provisioned portion of other filesystems. Even if those are tiered, and data can be released (to object-store) or deleted, the SSD space can still get filled when data keeps being written or promoted from the object-store.
To create a new filesystem, in this case, use the weka fs reserve
CLI command. Once enough space is cleared from the SSD (either by releasing to object-store or explicitly deleting data), it is possible to create the new filesystem using the reserved space.
Command: weka fs update
Use the following command line to edit an existing filesystem:
weka fs update <name> [--new-name new-name] [--total-capacity total-capacity] [--ssd-capacity ssd-capacity] [--thin-provision-min-ssd thin-provision-min-ssd] [--thin-provision-max-ssd thin-provision-max-ssd] [--data-reduction data-reduction] [--auth-required auth-required] [--kms-key-identifier kms-key-identifier] [--kms-namespace kms-namespace] [--kms-role-id kms-role-id] [--kms-secret-id kms-secret-id] [--use-cluster-kms-key-identifier]
Parameters
name
*
Name of the filesystem to edit.
new-name
New name for the filesystem.
total-capacity
Total capacity of the edited filesystem.
ssd-capacity
SSD capacity of the edited filesystem. Minimum value: 1GiB.
thin-provision-min-ssd
thin-provision-max-ssd
data-reduction
Enable data reduction. The filesystem must be non-tired and thin-provisioned. A license with data reduction is required.
auth-required
kms-key-identifier
Customize KMS key identifier for this filesystem (only for HashiCorp Vault).
kms-namespace
Customize KMS namespace for this filesystem (only for HashiCorp Vault).
kms-role-id
Customize KMS role-id for this filesystem (only for HashiCorp Vault).
kms-secret-id
Customize KMS secret-id for this filesystem (only for HashiCorp Vault).
use-cluster-kms-key-identifier
Enable cluster KMS configuration for this filesystem, which removes any custom KMS settings previously applied to it.
Command: weka fs delete
Use the following command line to delete a filesystem:
weka fs delete <name> [--purge-from-obs]
Parameters
name
*
Name of the filesystem to delete.
purge-from-obs
For a tiered filesystem, if set, all filesystem data is deleted from the object store bucket.
False
Using purge-from-obs
removes all data from the object-store. This includes any backup data or snapshots created from this filesystem (if this filesystem has been downloaded from a snapshot of a different filesystem, it will leave the original snapshot data intact).
If any of the removed snapshots have been (or are) downloaded and used by a different filesystem, that filesystem will stop functioning correctly, data might be unavailable and errors might occur when accessing the data.
It is possible to either un-tier or migrate such a filesystem to a different object store bucket before deleting the snapshots it has downloaded.
Command: weka fs kms-rewrap
Rewrap operations can be performed per filesystem, enabling each key to be re-encrypted with a new version if there are concerns about key compromise. Use the following command to run this operation:
weka fs kms-rewrap <name>
Parameters
name
*
Filesystem name
For filesystems, this is the minimum SSD capacity that is ensured to be always available to this filesystem. Must be set when defining a thin-provisioned filesystem. Minimum value: 1GiB.
For filesystem, this is the maximum SSD capacity the filesystem can consume.
The value cannot exceed the total-capacity
.
Require the mounting user to be authenticated for mounting this filesystem. This flag is only effective in the root organization, users in non-root organizations must be authenticated to perform a mount operation.
Format: yes
or no
.
See .
If a KMS is unavailable for a POC, contact the for guidance.
For filesystems, this is the minimum SSD capacity that is ensured to be always available to this filesystem. Minimum value: 1GiB.
For filesystem, this is the maximum SSD capacity the filesystem can consume.
The value must not exceed the total-capacity
.
Determines if mounting the filesystem requires being authenticated to Weka ().
Possible values: yes
or no
.